Corrupted ZIP files with malicious code emerging on computer screen
MediumMalware

Zombie ZIP: How Malformed Archives Let Malware Slip Past Antivirus and EDR Tools

Security researchers disclosed the Zombie ZIP technique on March 10, 2026 — a method exploiting malformed ZIP archive structures to hide malicious payloads from antivirus engines and EDR platforms, with no patch available and active use in the wild already documented via the Gootloader malware family.

Emanuel DE ALMEIDA 10 Mar 2026, 21:05 5 min read 1 views 0 Comments

Last updated 11 Mar 2026, 05:24

Key Takeaways

What Is the Zombie ZIP Technique?

Security researchers disclosed the Zombie ZIP technique on March 10, 2026 — a malware delivery method that exploits fundamental weaknesses in how antivirus engines and EDR platforms process ZIP archive files. The technique creates specially crafted, malformed ZIP archives whose internal structure causes security scanners to fail at decompressing and inspecting the actual payload, producing a false negative and allowing malicious content to pass undetected.

The vulnerability class underpinning Zombie ZIP was formally documented by CERT/CC under advisory VU#976247, which confirmed that malformed ZIP headers can cause antivirus and endpoint detection and response software to produce false negatives. The advisory noted that despite malformed headers, some extraction software is still able to decompress the archive, allowing payloads to execute upon file decompression on the victim system.

How the Technique Works: Exploiting ZIP Metadata

The ZIP file format relies on internal metadata fields — including compression method, flags, and version information — that antivirus engines use to determine how to preprocess and decompress an archive before scanning its contents. Zombie ZIP and related techniques manipulate these fields in ways that cause security tools to either skip decompression entirely or decompress incorrectly, leaving the actual payload unexamined.

In practice, attackers can modify the compression method field so that the antivirus fails to decompress the file. A custom loader embedded in the attack chain then ignores the declared method field and decompresses the embedded data directly, recovering and executing the malicious payload on the victim machine. The file is effectively invisible to the scanner but fully functional when extracted by the attacker's code or by certain archive utilities.

A related and documented variant involves ZIP file concatenation, where attackers combine 500 to 1,000 ZIP archives into a single file. Because many security tools only parse the first directory in a concatenated archive, malware buried in the later layers remains undetected. This specific technique was observed in active Gootloader campaigns in January 2026, where concatenated malformed ZIPs containing JavaScript payloads successfully bypassed most security tools and were only decompressable by Windows' default file archiver.

Already Used in the Wild: Gootloader and NanoCore Campaigns

Zombie ZIP is not a purely theoretical research technique. Malformed ZIP archives have been actively weaponized in multiple documented attack campaigns. In January 2026, the Gootloader malware family deployed malformed, hashbusting ZIP archives — each one uniquely crafted per victim to defeat hash-based detection — to deliver JavaScript payloads via SEO poisoning and malvertising targeting users searching for legal document templates. Once executed, the JavaScript established persistence and launched PowerShell-based execution chains linked to Vanilla Tempest ransomware operations.

Earlier campaigns have used specially crafted ZIPs to bypass secure email gateways and deliver payloads including the NanoCore RAT. The technique exploits the inconsistency in how different archive utilities (7-Zip, WinRAR, and Windows File Explorer) handle malformed archives, creating blind spots that attackers can reliably exploit.

Why Antivirus and EDR Tools Struggle to Detect This

Most antivirus and EDR platforms rely on static signature-based scanning and file metadata analysis. When an archive's metadata is deliberately corrupted or manipulated, the scanning engine may classify the file as unreadable or skip inspection of the compressed content entirely. Many security tools also lack recursive unpacking capabilities, meaning they do not parse every layer of a concatenated ZIP — a gap that threat actors have been exploiting systematically.

Organizations relying solely on signature-based detection and perimeter email filtering are most exposed. The technique does not exploit a specific software vulnerability in a single product but rather a design limitation that affects how most security tools handle malformed compressed files.

No Patch Available — Defense Depends on Detection Strategy

No universal patch exists for this class of vulnerability because it stems from how compression tools and security engines handle malformed file structures, not from a specific exploitable code flaw. CERT/CC noted that many antivirus products will still flag malformed archives as corrupted but will not detect the actual malicious payload within them.

However, defenders are not without recourse. Security teams should:

  • Implement behavioral analysis tools that examine file execution patterns rather than relying on static signatures alone.
  • Deploy security solutions with recursive unpacking capabilities that can parse nested and concatenated archive layers.
  • Monitor for unusual ZIP file structures at the email gateway and endpoint level, including files flagged as corrupted but still executable.
  • Apply content disarm and reconstruction (CDR) technology to strip and rebuild archive files before delivery to endpoints.
  • Use sandboxed execution environments to detonate suspicious archives and observe runtime behavior before allowing them to reach end users.

Gootloader's malformed ZIP archives do have identifiable structural signatures that defenders can use to build detection rules, as documented by threat intelligence teams at Expel. Organizations with mature detection engineering programs can create behavioral SIEM and EDR detections based on how Windows processes these archives even when scanning tools fail.

Frequently Asked Questions

What is the Zombie ZIP technique?
A malware evasion method that uses specially crafted ZIP files to hide malicious payloads from antivirus and EDR detection systems.
Which security tools are affected by Zombie ZIP?
Antivirus software and endpoint detection and response (EDR) products that rely on signature-based scanning of compressed files.
How can organizations protect against Zombie ZIP attacks?
Implement behavioral analysis tools that examine file execution patterns rather than relying solely on static signature-based detection methods.

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...